contact us

Comments

Popular posts from this blog

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

BITFLIPING

PlayItSafe google cyber security professional course 2 (COURSERA)

AUTOMATED SCRIPT FOR FINDING XSS

BEGINNER BUG BOUNTY TOOLS PART-1

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.

BEGINNER BUG BOUNTY TOOLS PART 2

Things should do after sublister(sublist3r)

Identifying the device category using the Win32_Battery WMI class.